cloud computing pddf
cloud computing pddf
Answer Answer
Answer
1. Elements of Service Oriented Architecture (SOA):
Distributed computing is a model in which components of a software S. No. RESTful web service RESTless web service
system are shared among multiple computers to improve
performance. efficiency and 1. An application that provides An application that is not based on
2 In distributed computing, each processor has its
SOA interoperability between the principle of REST.
own private memory computer systems on the
(distributed memory). Information is exchanged by passing messages internet.
between the processors.
3 2, Use REST. Use SOAP.
A distributed system allows resource sharing,
systems connected to the network.
including software by Application Service
Service
Service Bus
frontend repository 3. Support various data format Support XML format.
4 The goal of distributed computing is to make network as a such as HTML, JSON, etc.
computer.
single
4 Use ÜRL to expose business Use the service interface to expose
5. Examples of distributed systems /applications of distributed computing business logic.
logic.
are :Intranets, Internet, WWW, email. Contract Implementation Interface
5 Easier and flexible. Not easy and flexible.
Que 1.21. Differentiate between parallel computing and distributed
6 Inherits security measures Defines its own security layer and
computing. from the underlying is more secure.
transport protocols.
Answer Business logic Data
7 Consume less bandwidth and Consume more bandwidth and
S.No. Parallel computing Distributed computing resources. resources.
1. Application frontend :
1 It is a type of computation A system whose components are a. Application frontends are active elements of the SOA, delivering
in which many calculations located on different networked
or the execution of
the value of SOA to the end users.
Que 2.14. What are the advantages of REST?
computers, which communicate b They initiate and control all activity of the enterprise system.
processes are carried out and coordinate their actions by
simultaneously. passing messages to one another. 2. Service: It is a software component that encapsulates a high level Answer
2 It occurs in a single
business concept. The advantages of REST are :
It involves multiple computers. the server:
computer.
3 Contract : It provides a specification of the purpose, functionality, 1. Separation between the client and
constraints, and usage of services. interface from the
3. Multiple processors execute a The REST protocol totally separates the user
Multiple computers perform tasks 4 Interface : Functionality of the service exposed by the service to the server and the data storage.
multiple tasks at the same at the same time. clients that are connected to the service. interface to other
time. b For example, it improves the portability of the the projects, and
5. Implementation :The service implementation provides the required types of platforms, it increases the scalability of
business logic and appropriate data. It contains one or more of the be evolved
allows the different components of the developments to
4. Computer can have shared Each computer has its own
memory or distributed memory. artifacts :programs, configuration, data and databases. independently.
memory. 6. Business logic : Business process represented by the service.
7 Data: Data represented in the service used by the service. 2. Visibility, reliability and scalability :
evident
Processors communicate separation between client and server has one
5.
Computers communicate with The
with each other using a each other through the network. 8. Service repository :It registers the services and their attributes to advantage, that each development team can scale the
product
bus. facilitate the discovery of services, operation, access rights, without problem.
qualities, etc. owner,
of changes in
6. Increase the performance Allows scalability sharing 9. Service bus: Aflexible infrastructure for integrating b They can migrate to other servers or make all kinds is sent
of the system. resources and helps to perform applications and
services by :routing messages, transforming protocols between the database, provided that the data from each request
computation tasks efficiently. and service, handling business events and requestor correctly.
QoS,security, and managing the delivering them, providing
interaction among services.
45E (CSIT-Sem-7)
Cloud Computing 2-27 E (CSIT-Sem-7) Cloud Computing Cloud Computing 4-11 E(CIT-Sem-7)
services are OPTIMIS,
Host-based virtualization: iv. The inter cloud projects that use multi-cloud cloud management
An alternative VM architecture is to install a virtualization layer on contrail, MOSAIC, STRATOS and commercial PART-4
top of the host OS. This host OS is still responsible for managing systems.
the hardware.
4. Multi-cloud libraries : Security Overview, Cloud Security Challenges.
as a
ii. The guest OS are installed and run on top of the virtualization 1 Clients develop their own brokers by using a unified cloud API
layer. library. in a Questions-Answers
ii. Dedicated applications may run on the VMs. Certainly,some other i. Inter clouds that use libraries facilitate the usage of clouds
uniform way.
applications can also run with the host OS directly. J-clouds, Long Answer Type and Medium Answer Type Questions
ii. Examples of Several Multi-cloud Libraries are Java library
iv. Advantages of host- based architecture: Python library Apache Lib-Clouds, Ruby library Apache Delta
The user can install the VM architecture without modifying Cloud.
a.
the host OS. The virtualizing software can rely on the host OS Que 4.13. Give a schematic diagram of various cloud
Que 4.5. Explain the extended cloud computing services. security
services. This will
to provide device drivers and other low-level challenges ?
simplify the VM design and ease its deployment.
Answer
b The host-based approach appeals to many host machine Answer
configurations. Compared to the hypervisor/VMM architecture, 1 Fig. 4.5.1 shows six layers of cloud services ranging from hardware,
1 Fig. 4.13.1 represents the schematic diagram showing the hierarchy of
the cloud computing, with security challenges on both the
the performance of the host-based architecture may also be network, and collocation to infrastructure, platform, and software cloud
low. applications. computing models, deployment and service models and also the issues
related to networks.
Que 2.31. Describe para-virtualization. Cloud application (SaaS)
Cloud computing
Answer Cloud software environment (PaaS) Security challenges
Para-virtualization :
Cloud software infrastructure
Deployment models Service model
Network issues
Application Application Computational Storage Communications
resources (IaaS) (DaaS) (CaaS)
Para-virtualized Para-virtualized Browser security
guest operating Private Public| Hybrid SaaS PaaS laaS
guest operating Collocation cloud services (Laas)
system SQL injection attack
system
Hypervisor/VMM Network cloud services (NaaS) Flooding attack
Cloning and Data leakage
resource pooling problems
Hardware Hardware/Virtualization cloud services (HaaS)
XML signature
Motility of data and
Malicious attacks
element wrapping
data residuals
Fig. 2.31,1. Fig. 4.5.1. A stack of six layers of cloud services and their providers. Incomplete data
Para-virtualization needs to modify the guest operating systems. Elastic perimeter Backup and storage deletion
1 2 The top three service layers are SaaS, PaaS, and laaS.
substantial OS
Apara-virtualized VM provides special API requiring Shared multi-tenant Locks-in
2 3 The cloud platform provides PaaS, Which sits on top of the IaaS Shared technological
modifications in user applications. infrastructure. environment issues
machine
3 The virtualization layer can be inserted at different positions in a 4 The top layer offers SaaS. These must be implemented on the cloud Unencrypted data
software stack. Service hijacking
platforms provided. Although the three basic models are dissimilar in
4 Para-virtualization attempts toreduce the virtualization overhead, and usage, they are built one on top of another. Authentication and Virtual machine
kernel.
thus improve performance by modifying only the guest OS 5 The implication is that one cannot launch Sass applications with a cloud identity management
hopping
5 The guest operating systems are para-virtualized. They are assisted by platform. The cloud platform cannot be built if compute and storage
OS instructions
an intelligent compiler to replace the non-virtualizable infrastructures are not there. Fig. 4.13.1. Classification of security
challenge.
by hypercalls.